Quickbooks Phishing AttackPurporting to be invoices and payment reminders, this new campaign targets users of the popular accounting software to install the banking trojan on its victims endpoints. The bad guys have long known that emails involving the concept that the recipient owes money will get a response. They also know if you use a […]
FBI Finds Phishing Sites Abusing Search Results and Ads to Steal Banking Credentials
The US Federal Bureau of Investigation has sent out a private industry notification (PIN) warning that cybercriminals are using search engine ads and search results to spread phishing sites that impersonate banking websites. The FBI says this campaign has been running since March of 2021, although the Record notes that this technique has been in […]
10 essential cybersecurity tips for beginners
By Raghav Iyer Organizations today are challenged by an increased exposure to cyber threats. Attackers often target emerging technologies since the new technology is often ill-equipped to handle an attack. Moreover, the internet has become filled with malicious links, Trojans, and viruses. The pressure to keep up with the new and emerging technologies often coerces […]
Microsoft Patch Tuesday May 2021 fixes 55 vulnerabilities, including 3 zero-days
By Karthika Surendran This month’s Patch Tuesday is here and the hustle is on. With most organizations embracing a distributed workforce these days, system administrators are bound to be up to their ears in work for the next two weeks, testing and figuring out how to deploy updates to secure all of their machines. It […]
Five worthy reads: Is DataOps the next big value driver in the analytics ecosystem?
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about DataOps, an interesting methodology that can help organizations fast-track their data analytics operations. By Monisha Ravi With the current data trend, there is an ever-increasing demand for data professionals to […]
Launching RMM Central: A unified IT solution for managed service providers
By Nisha Balajee We’re pleased to introduce ManageEngine RMM Central, a unified remote monitoring and management solution. Maintaining the IT infrastructure and systems of client networks is a herculean task for IT service providers. Multiple tools perform various capabilities in network management, be it maintaining or managing workstations, laptops, servers, and other networks. Managed service […]
COVID-Related Phishing Attacks Return to Mid-Pandemic Heights
New data from Palo Alto Network’s Unit42 provides a wealth of insight into specifically how cybercriminals have leveraged COVID-related theming to ensure a successful phishing attack. Throughout the last 14 months, the bad guys have consistently kept pace with the state of the pandemic. They have been looking for the best aspects of the COVID […]
FBI Obtains Authorization to Access US Servers to Remove Webshells Due to Exchange Vulnerability
Your server could have been compromised and the FBI was trying to mitigate the issue without you even knowing it yet. Yesterday the Department of Justice revealed in a statement that the FBI was granted access to remove web shells that were installed on compromised web servers. These web servers are related to the Microsoft […]
Together, Scale Computing and Acronis Make Data Protection Easy (and More Affordable)
By Mitch Etchason IT pros are under enormous pressure to protect every piece of data without impacting production systems. A daunting task for sure, but it doesn’t have to be a difficult one. Thanks to a new Scale Computing Business Resiliency System (BRS) appliance and a special, limited-time offer, we’re making data protection not just […]
DHCP server monitoring made easy with OpUtils
By Sharon Abraham In today’s complex IT infrastructures, Dynamic Host Configuration Protocol (DHCP) servers play an indispensable role in automating IP allocation and configuration. A DHCP server’s capacity to allocate IPs to the requesting clients in real-time is one of the factors that ensures constant uptime of dynamic networks. However, even though a network’s availability […]